SlideShare a Scribd company logo
Welcome to the Webinar
Contextual Security and Application Control for Virtualized Desktops
Tim Cox
Principal Sales Engineer
Ivanti
Jens Schmidt
Sales Manager
deviceTRUST
Sascha Goeckel
Pre-Sales Manager
deviceTRUST
Agenda
• Welcome
• Ivanti Application Control
• deviceTRUST Contextual Security
• Live Demo
• Summary
Established in 1985
Privately owned
Headquarters in Salt Lake City, UT.
~1,900 employees in 23 countries
27,500+ customers, 47.5M+ endpoints
1,500+ partners
10 acquisitions since 2012
20152005200019901985 1995 2010 2020
ITAM
Security
ITSM
Supply Chain
UEM
Ivanti DNA
Highlighted Ivanti Capabilities
Discovery • Reporting • Analytics • Workflow Automation • Self Service
Cloud or On-Premises
Full ITSM /
ITIL Support
Voice Automation /
Telephony
Service
Catalog
Project Portfolio
Management
Service
Management
IT
Operations
Software / Hardware Asset
Management
Device Lifecycle
Management
Environment
Management
File & Profile
Migration
Software
Distribution
AV /
Anti-Malware
Patch
Management
Device and
App Control
Privilege
Management
Configuration
Management
Operational
Security
On-boarding /
Off-boarding
Mobility
Management
Voice
Enablement
Mobile Browser
Solutions
Terminal
Emulation
Smart Device
Remote Control
Supply
Chain
•Ivanti Application Control
WHAT IS APPLICATION CONTROL™, AND HOW CAN IT HELP
ENTERPRISE BUSINESSES?
1. Remove administrative rights
2. Stay up-to-date on business objectives through
operational security practices
3. Control network access to critical applications
and data
… ALL WITHOUT AFFECTING the user’s workflow and productivity, yet also
helping to enable their relationship with IT.
APPLICATION CONTROL:
KEY DIFFERENTIATORS AND FOCUSES
 Runs ‘Headless’ and Secure by Design
 On the workspace, just an agent and configuration
are needed, backend optional.
 Works online OR offline.
 Protection against uninstallation.
 Agnostically Awesome
 Works on any Windows OS (version applicable).
 Works across any platform; physical, virtual,
datacenter, or cloud.
 Say Goodbye to Traditional Whitelisting
 Trusted Ownership ensures those applications
installed by trusted installers can run without
needing to whitelist them.
 Quickly apply to any scenario
 Protect against File-Based (Ransomware) & File-
Less Malware
 Trusted Ownership creates a layer of ‘zero-trust’;
everything is blocked from executing except
authorized applications.
 Confidently Control Licensed Applications
 Ensure only those needing access to licensed applications
can run them
APPLICATION CONTROL: PRIVILEGE MANAGEMENT
 Facilitate the removal of admin rights
from enterprise
 Allow the execution of applications that cannot run with
standard user rights
 Not just to admin, to any rights level that is needed
 Allow users access to the tools they need,
without excess rights
 Defrag the drive, change time, etc.
 Support personal applications while allowing it
the control they require.
 Known good locations containing known good apps
 Elevation of active x installs
 Apps within Internet Explorer
APPLICATION CONTROL: TRUSTED OWNERSHIP
 On any windows system, there are certain accounts
that are trusted to introduce new software, where
everything they install is inherently ‘owned’:
 The system account
 Local admin
 Trusted installer
 “Administrators” groups (Local or Active Directory)
 (Add your own users or groups from your environment)
 As a fundamental security model of the Windows OS,
with application control, if the file is not owned by a
trusted ‘owner’, it won’t be allowed to execute.
WELCOME TO DYNAMIC WHITELISTING
APPLICATION CONTROL: POWER BEYOND PRIVILEGE
 Contextual based control
 SHA1/SHA2 Whitelisting
 Metadata support
 Certificate Support
 Secure dialog box support
 Passive mode
 URL Redirection
 Licensing / Compliance control
 Software Asset Management
 Application Network Access control
 Windows 10 Support
 Windows App Store Support
 Prevent configured apps from being
terminated
 Windows services protections
 Application installation/uninstallation
protections
 AD and OU Support
 Scripted rules
 Scriptable agents and console
 Enterprise auditing
 App V support
 Citrix / Terminal Server Support
 Registered allocated Windows altitude Driver
https://msdn.microsoft.com/en/us/library/windows/hardware/dn265170(v=vs.85).aspx
 Certified MS Product
 SCCM integration
 AD/GPO deployment
 SCOM Management packs
Standard or Administrator
AdministratorUser
Removing admin rights from your desktops…
Ivanti Application Control
 Privilege management, Trusted Ownership
About us
• German-based ISV founded in January 2016
• Customers from the verticals Finance, Healthcare,
Transport & Government with up to 63,000 licensed
users
• Germany’s most active seed stage investor High-Tech
Gründerfonds (HTGF) invested in July 2017
Headquarter Office
HUB31, Darmstadt DE
Development Office
The Innovation Centre, Daresbury UK
Why deviceTRUST
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Why deviceTRUST
User Authentication
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Security, Compliance & Regulatory Requirements
Why deviceTRUST
User Authentication
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Security, Compliance & Regulatory Requirements
Why deviceTRUST
User Authentication
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Security, Compliance & Regulatory Requirements
deviceTRUST Contextual Security
deviceTRUST Solution
deviceTRUST Contextual Security
Actions & triggers with no additional infrastructure.
Context
Endpoint
Information
Location
Information
Network
Information
• Security State
• Hardware
• Corporate Certificate
• Domain Membership
• …
• Access Type
• Validated Network
• Wi-Fi Network
• Network Security
• …
• Geolocation
• Internet Service Provider (ISP)
• Network Location
• …
deviceTRUST Solution
deviceTRUST Contextual Security
Actions & triggers with no additional infrastructure.
Contextual Access
Actions
Contextual Policies
Contextual
Application Access
Context
Endpoint
Information
Location
Information
Network
Information
• Security State
• Hardware
• Corporate Certificate
• Domain Membership
• …
• Access Type
• Validated Network
• Wi-Fi Network
• Network Security
• …
• Geolocation
• Internet Service Provider (ISP)
• Network Location
• …
Live Demo
deviceTRUST Architecture – No infrastructure required!
deviceTRUST Architecture – No infrastructure required!
deviceTRUST Architecture – No infrastructure required!
Use Case Overview
• Conditional access based on context (network, Wi-Fi security, geolocation,
location, hardware used, corporate endpoint etc.)
• Contextual application access (e.g. with Ivanti Application Control)
• Location based resource mapping
• Wi-Fi roaming based default printer management
• Device-based licensing (e.g. Microsoft Visio license compliance)
• External partner access
• Improve usability
• Optimize screen saver configuration
• Inform user about endpoint is going out of battery
• Location aware Google Chrome Search Provider & Google Maps home
• Context everywhere (double-hop support)
• …
Live Demo
• Check out our Use Case videos:
• Website: https://deviceTRUST.com/Ivanti
• YouTube: https://www.youtube.com/channel/UCQIXvqqMDNjkcQQR48F7CDQ
Thank you
Internet: https://devicetrust.com
Email: sales@devicetrust.com
Twitter: @deviceTRUST
Contacts: Jens Schmidt
Email: jens.schmidt@devicetrust.com
Mobil: +49 (1520) 4457309
Sascha Goeckel
Email: sascha.goeckel@devicetrust.com
Mobil: +49 (151) 20522308
Do you like to know more about our solution, please contact us:

More Related Content

What's hot

AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
Ivanti
 
Technology for People in Healthcare
Technology for People in HealthcareTechnology for People in Healthcare
Technology for People in Healthcare
RES
 
How to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service TechnologyHow to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service Technology
RES
 
Empower Your Workforce Through Self Service
Empower Your Workforce Through Self ServiceEmpower Your Workforce Through Self Service
Empower Your Workforce Through Self Service
RES
 
Service Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study WebinarService Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study Webinar
Ivanti
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service Adoption
RES
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
RES
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
RES
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
Ghassan Chahine
 
SMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSMSMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSM
Ivanti
 
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar SlidesMind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
RES
 
Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
RES
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
RES
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
centralohioissa
 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingAre Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
RES
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
IISGL
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
Adrian Dumitrescu
 
Beyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar SlidesBeyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar Slides
RES
 
Virtualization security audit
Virtualization security auditVirtualization security audit
Virtualization security audit
Network Intelligence India
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line
Net at Work
 

What's hot (20)

AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
 
Technology for People in Healthcare
Technology for People in HealthcareTechnology for People in Healthcare
Technology for People in Healthcare
 
How to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service TechnologyHow to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service Technology
 
Empower Your Workforce Through Self Service
Empower Your Workforce Through Self ServiceEmpower Your Workforce Through Self Service
Empower Your Workforce Through Self Service
 
Service Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study WebinarService Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study Webinar
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service Adoption
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
SMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSMSMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSM
 
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar SlidesMind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
 
Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingAre Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Beyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar SlidesBeyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar Slides
 
Virtualization security audit
Virtualization security auditVirtualization security audit
Virtualization security audit
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line
 

Similar to Contextual Security and Application Control for Virtualized Desktops

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
Ivanti
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
DNUG e.V.
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
InTTrust S.A.
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
Precisely
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
Precisely
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
Primend
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
Ivanti
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Technologies
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
DNUG e.V.
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
Stephen Rose
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Primend
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
Teemu Tiainen
 

Similar to Contextual Security and Application Control for Virtualized Desktops (20)

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 

More from Ivanti

Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________
Ivanti
 
Patch Tuesday de Junio
Patch Tuesday de JunioPatch Tuesday de Junio
Patch Tuesday de Junio
Ivanti
 
Patch Tuesday Italia Giugno
Patch Tuesday Italia GiugnoPatch Tuesday Italia Giugno
Patch Tuesday Italia Giugno
Ivanti
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
Ivanti
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
Ivanti
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
Ivanti
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
Ivanti
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
Ivanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
Ivanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
Ivanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
Ivanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
Ivanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
Ivanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
Ivanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
Ivanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
Ivanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
Ivanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
Ivanti
 

More from Ivanti (20)

Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________
 
Patch Tuesday de Junio
Patch Tuesday de JunioPatch Tuesday de Junio
Patch Tuesday de Junio
 
Patch Tuesday Italia Giugno
Patch Tuesday Italia GiugnoPatch Tuesday Italia Giugno
Patch Tuesday Italia Giugno
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 

Recently uploaded

Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
Alina Yurenko
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
kalichargn70th171
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
Ortus Solutions, Corp
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Flutter vs. React Native: A Detailed Comparison for App Development in 2024
Flutter vs. React Native: A Detailed Comparison for App Development in 2024Flutter vs. React Native: A Detailed Comparison for App Development in 2024
Flutter vs. React Native: A Detailed Comparison for App Development in 2024
dhavalvaghelanectarb
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
confluent
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
Anand Bagmar
 
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
OnePlan Solutions
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
Paul Brebner
 
Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
KrishnaveniMohan1
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
servicesNitor
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
Computer Science & Engineering VI Sem- New Syllabus.pdf
Computer Science & Engineering VI Sem- New Syllabus.pdfComputer Science & Engineering VI Sem- New Syllabus.pdf
Computer Science & Engineering VI Sem- New Syllabus.pdf
chandangoswami40933
 
Optimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptxOptimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptx
WebConnect Pvt Ltd
 

Recently uploaded (20)

Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Flutter vs. React Native: A Detailed Comparison for App Development in 2024
Flutter vs. React Native: A Detailed Comparison for App Development in 2024Flutter vs. React Native: A Detailed Comparison for App Development in 2024
Flutter vs. React Native: A Detailed Comparison for App Development in 2024
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
 
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
 
Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
 
bgiolcb
bgiolcbbgiolcb
bgiolcb
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
Computer Science & Engineering VI Sem- New Syllabus.pdf
Computer Science & Engineering VI Sem- New Syllabus.pdfComputer Science & Engineering VI Sem- New Syllabus.pdf
Computer Science & Engineering VI Sem- New Syllabus.pdf
 
Optimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptxOptimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptx
 

Contextual Security and Application Control for Virtualized Desktops

  • 1. Welcome to the Webinar Contextual Security and Application Control for Virtualized Desktops Tim Cox Principal Sales Engineer Ivanti Jens Schmidt Sales Manager deviceTRUST Sascha Goeckel Pre-Sales Manager deviceTRUST
  • 2. Agenda • Welcome • Ivanti Application Control • deviceTRUST Contextual Security • Live Demo • Summary
  • 3. Established in 1985 Privately owned Headquarters in Salt Lake City, UT. ~1,900 employees in 23 countries 27,500+ customers, 47.5M+ endpoints 1,500+ partners 10 acquisitions since 2012
  • 4. 20152005200019901985 1995 2010 2020 ITAM Security ITSM Supply Chain UEM Ivanti DNA
  • 5. Highlighted Ivanti Capabilities Discovery • Reporting • Analytics • Workflow Automation • Self Service Cloud or On-Premises Full ITSM / ITIL Support Voice Automation / Telephony Service Catalog Project Portfolio Management Service Management IT Operations Software / Hardware Asset Management Device Lifecycle Management Environment Management File & Profile Migration Software Distribution AV / Anti-Malware Patch Management Device and App Control Privilege Management Configuration Management Operational Security On-boarding / Off-boarding Mobility Management Voice Enablement Mobile Browser Solutions Terminal Emulation Smart Device Remote Control Supply Chain
  • 7. WHAT IS APPLICATION CONTROL™, AND HOW CAN IT HELP ENTERPRISE BUSINESSES? 1. Remove administrative rights 2. Stay up-to-date on business objectives through operational security practices 3. Control network access to critical applications and data … ALL WITHOUT AFFECTING the user’s workflow and productivity, yet also helping to enable their relationship with IT.
  • 8. APPLICATION CONTROL: KEY DIFFERENTIATORS AND FOCUSES  Runs ‘Headless’ and Secure by Design  On the workspace, just an agent and configuration are needed, backend optional.  Works online OR offline.  Protection against uninstallation.  Agnostically Awesome  Works on any Windows OS (version applicable).  Works across any platform; physical, virtual, datacenter, or cloud.  Say Goodbye to Traditional Whitelisting  Trusted Ownership ensures those applications installed by trusted installers can run without needing to whitelist them.  Quickly apply to any scenario  Protect against File-Based (Ransomware) & File- Less Malware  Trusted Ownership creates a layer of ‘zero-trust’; everything is blocked from executing except authorized applications.  Confidently Control Licensed Applications  Ensure only those needing access to licensed applications can run them
  • 9. APPLICATION CONTROL: PRIVILEGE MANAGEMENT  Facilitate the removal of admin rights from enterprise  Allow the execution of applications that cannot run with standard user rights  Not just to admin, to any rights level that is needed  Allow users access to the tools they need, without excess rights  Defrag the drive, change time, etc.  Support personal applications while allowing it the control they require.  Known good locations containing known good apps  Elevation of active x installs  Apps within Internet Explorer
  • 10. APPLICATION CONTROL: TRUSTED OWNERSHIP  On any windows system, there are certain accounts that are trusted to introduce new software, where everything they install is inherently ‘owned’:  The system account  Local admin  Trusted installer  “Administrators” groups (Local or Active Directory)  (Add your own users or groups from your environment)  As a fundamental security model of the Windows OS, with application control, if the file is not owned by a trusted ‘owner’, it won’t be allowed to execute. WELCOME TO DYNAMIC WHITELISTING
  • 11. APPLICATION CONTROL: POWER BEYOND PRIVILEGE  Contextual based control  SHA1/SHA2 Whitelisting  Metadata support  Certificate Support  Secure dialog box support  Passive mode  URL Redirection  Licensing / Compliance control  Software Asset Management  Application Network Access control  Windows 10 Support  Windows App Store Support  Prevent configured apps from being terminated  Windows services protections  Application installation/uninstallation protections  AD and OU Support  Scripted rules  Scriptable agents and console  Enterprise auditing  App V support  Citrix / Terminal Server Support  Registered allocated Windows altitude Driver https://msdn.microsoft.com/en/us/library/windows/hardware/dn265170(v=vs.85).aspx  Certified MS Product  SCCM integration  AD/GPO deployment  SCOM Management packs
  • 13. Removing admin rights from your desktops…
  • 14. Ivanti Application Control  Privilege management, Trusted Ownership
  • 15. About us • German-based ISV founded in January 2016 • Customers from the verticals Finance, Healthcare, Transport & Government with up to 63,000 licensed users • Germany’s most active seed stage investor High-Tech Gründerfonds (HTGF) invested in July 2017 Headquarter Office HUB31, Darmstadt DE Development Office The Innovation Centre, Daresbury UK
  • 16. Why deviceTRUST Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
  • 17. Why deviceTRUST User Authentication Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc. Security, Compliance & Regulatory Requirements
  • 18. Why deviceTRUST User Authentication Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc. Security, Compliance & Regulatory Requirements
  • 19. Why deviceTRUST User Authentication Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc. Security, Compliance & Regulatory Requirements deviceTRUST Contextual Security
  • 20. deviceTRUST Solution deviceTRUST Contextual Security Actions & triggers with no additional infrastructure. Context Endpoint Information Location Information Network Information • Security State • Hardware • Corporate Certificate • Domain Membership • … • Access Type • Validated Network • Wi-Fi Network • Network Security • … • Geolocation • Internet Service Provider (ISP) • Network Location • …
  • 21. deviceTRUST Solution deviceTRUST Contextual Security Actions & triggers with no additional infrastructure. Contextual Access Actions Contextual Policies Contextual Application Access Context Endpoint Information Location Information Network Information • Security State • Hardware • Corporate Certificate • Domain Membership • … • Access Type • Validated Network • Wi-Fi Network • Network Security • … • Geolocation • Internet Service Provider (ISP) • Network Location • …
  • 23. deviceTRUST Architecture – No infrastructure required!
  • 24. deviceTRUST Architecture – No infrastructure required!
  • 25. deviceTRUST Architecture – No infrastructure required!
  • 26. Use Case Overview • Conditional access based on context (network, Wi-Fi security, geolocation, location, hardware used, corporate endpoint etc.) • Contextual application access (e.g. with Ivanti Application Control) • Location based resource mapping • Wi-Fi roaming based default printer management • Device-based licensing (e.g. Microsoft Visio license compliance) • External partner access • Improve usability • Optimize screen saver configuration • Inform user about endpoint is going out of battery • Location aware Google Chrome Search Provider & Google Maps home • Context everywhere (double-hop support) • …
  • 27. Live Demo • Check out our Use Case videos: • Website: https://deviceTRUST.com/Ivanti • YouTube: https://www.youtube.com/channel/UCQIXvqqMDNjkcQQR48F7CDQ
  • 28. Thank you Internet: https://devicetrust.com Email: sales@devicetrust.com Twitter: @deviceTRUST Contacts: Jens Schmidt Email: jens.schmidt@devicetrust.com Mobil: +49 (1520) 4457309 Sascha Goeckel Email: sascha.goeckel@devicetrust.com Mobil: +49 (151) 20522308 Do you like to know more about our solution, please contact us:

Editor's Notes

  1. The Ivanti DNA… what makes us what we are, and unique in the industry, is the result of the organic work we’ve done over the years, as well as the strategic acquisitions we have made, each of which added capabilities in our 5 areas of focus: IT Asset Management IT Service Management Operational Security Unified Endpoint Management Supply Chain enablement
  2. 30 labs were done in 2016
  3. 30 labs were done in 2016
  4. 30 labs were done in 2016